{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T13:27:33Z","timestamp":1648992453666},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2014,7,15]],"date-time":"2014-07-15T00:00:00Z","timestamp":1405382400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Data Min Knowl Disc"],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1007\/s10618-014-0360-3","type":"journal-article","created":{"date-parts":[[2014,7,14]],"date-time":"2014-07-14T04:43:04Z","timestamp":1405312984000},"page":"689-731","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Detecting anomaly collections using extreme feature ranks"],"prefix":"10.1007","volume":"29","author":[{"given":"Hanbo","family":"Dai","sequence":"first","affiliation":[]},{"given":"Feida","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Ee-Peng","family":"Lim","sequence":"additional","affiliation":[]},{"given":"HweeHwa","family":"Pang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,7,15]]},"reference":[{"key":"360_CR1","unstructured":"Agrawal R, Srikant R (1994) Fast algorithms for mining association rules in large databases. In: Very Large Data Bases Conference (VLDB), pp 487\u2013499"},{"issue":"1","key":"360_CR2","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1214\/10-AOS839","volume":"39","author":"E Arias-Castro","year":"2011","unstructured":"Arias-Castro E, Candes EJ, Durand A (2011) Detection of an anomalous cluster in a network. Ann Stat 39(1):278\u2013304","journal-title":"Ann Stat"},{"key":"360_CR3","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/0166-218X(95)00026-N","volume":"65","author":"D Avis","year":"1993","unstructured":"Avis D, Fukuda K (1993) Reverse search for enumeration. Discret Appl Math 65:21\u201346","journal-title":"Discret Appl Math"},{"key":"360_CR4","volume-title":"Outliers statistical data","author":"V Barnett","year":"1994","unstructured":"Barnett V, Lewis T (1994) Outliers statistical data. Wiley, New York"},{"issue":"1","key":"360_CR5","doi-asserted-by":"crossref","first-page":"2:1","DOI":"10.1145\/1326561.1326563","volume":"2","author":"L Becchetti","year":"2008","unstructured":"Becchetti L, Castillo C, Donato D, Baeza-Yates R, Leonardi S (2008) Link analysis for web spam detection. ACM Trans Web 2(1):2:1\u20132:42","journal-title":"ACM Trans Web"},{"key":"360_CR6","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-3023-4_1","volume-title":"The maximum clique problem","author":"IM Bomze","year":"1999","unstructured":"Bomze IM, Budinich M, Pardalos PM, Pelillo M (1999) The maximum clique problem. Kluwer Academic Publishers, Norwell"},{"key":"360_CR7","doi-asserted-by":"crossref","unstructured":"Breunig MM, Kriegel HP, Ng RT, Sander J (2000) Lof: identifying density-based local outliers. In: ACM sigmod record, pp 93\u2013104","DOI":"10.1145\/335191.335388"},{"key":"360_CR8","doi-asserted-by":"crossref","unstructured":"Castillo C, Donato D, Gionis A, Murdock V, Silvestri F (2007) Know your neighbors: web spam detection using the web topology. In: International Conference on Research and Development in Information Retrieval (SIGIR), pp 423\u2013430","DOI":"10.1145\/1277741.1277814"},{"issue":"3","key":"360_CR9","doi-asserted-by":"crossref","first-page":"15:1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surv 41(3):15:1\u201315:58","journal-title":"ACM Comput Surv"},{"issue":"10","key":"360_CR10","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/MC.2004.165","volume":"37","author":"CEH Chua","year":"2004","unstructured":"Chua CEH, Wareham J (2004) Fighting internet auction fraud: an assessment and proposal. Computer 37(10):31\u201337","journal-title":"Computer"},{"key":"360_CR11","doi-asserted-by":"crossref","unstructured":"Dai H, Zhu F, Lim EP, Pang H (2012) Detecting extreme rank anomalous collections. In: SIAM International Conference on Data Mining (SDM), pp 883\u2013894","DOI":"10.1137\/1.9781611972825.76"},{"issue":"1","key":"360_CR12","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1007\/s10479-008-0371-9","volume":"168","author":"L Duan","year":"2009","unstructured":"Duan L, Xu L, Liu Y, Lee J (2009) Cluster-based outlier detection. Ann Oper Res 168(1):151\u2013168","journal-title":"Ann Oper Res"},{"issue":"272","key":"360_CR13","doi-asserted-by":"crossref","first-page":"1096","DOI":"10.1080\/01621459.1955.10501294","volume":"50","author":"CW Dunnett","year":"1955","unstructured":"Dunnett CW (1955) A multiple comparison procedure for comparing several treatments with a control. J Am Stat Assoc 50(272):1096\u20131121","journal-title":"J Am Stat Assoc"},{"key":"360_CR14","unstructured":"Eppstein D (2005) All maximal independent sets and dynamic dominance for sparse graphs. In: Symposium on Discrete Algorithms (SODA), pp 451\u2013459"},{"key":"360_CR15","unstructured":"Ester M, Kriegel HP, Sander J, Xu X (1996) A density-based algorithm for discovering clusters in large spatial databases with noise. In: International Conference on Knowledge Discovery and Data Mining (KDD), pp 226\u2013231"},{"key":"360_CR16","doi-asserted-by":"crossref","unstructured":"Fetterly D, Manasse M, Najork M (2004) Spam, damn spam, and statistics: using statistical analysis to locate spam web pages. In: Proceedings of the international workshop on the web and databases, pp 1\u20136","DOI":"10.1145\/1017074.1017077"},{"key":"360_CR17","doi-asserted-by":"crossref","unstructured":"Guha S, Rastogi R, Shim K (1999) Rock: a robust clustering algorithm for categorical attributes. In: International Conference on Data Engineering (ICDE), pp 512\u2013521","DOI":"10.1109\/ICDE.1999.754967"},{"key":"360_CR18","doi-asserted-by":"crossref","unstructured":"Gy\u00f6ngyi Z, Garcia-Molina H, Pedersen J (2004) Combating web spam with trustrank. In: Very Large Data Bases Conference (VLDB), pp 576\u2013587","DOI":"10.1016\/B978-012088469-8\/50052-8"},{"key":"360_CR19","unstructured":"Gy\u00f6ngyi Z, Berkhin P, Garcia-Molina H, Pedersen J (2006) Link spam detection based on mass estimation. In: Very Large Data Bases Conference (VLDB), pp 439\u2013450"},{"issue":"3","key":"360_CR20","doi-asserted-by":"crossref","first-page":"938","DOI":"10.1214\/aoms\/1177700066","volume":"36","author":"WL Harkness","year":"1965","unstructured":"Harkness WL (1965) Properties of the extended hypergeometric distribution. Ann Math Stat 36(3):938\u2013945","journal-title":"Ann Math Stat"},{"issue":"9","key":"360_CR21","doi-asserted-by":"crossref","first-page":"1641","DOI":"10.1016\/S0167-8655(03)00003-5","volume":"24","author":"Z He","year":"2003","unstructured":"He Z, Xu X, Deng S (2003) Discovering cluster-based local outliers. Pattern Recogn Lett 24(9):1641\u20131650","journal-title":"Pattern Recogn Lett"},{"issue":"3","key":"360_CR22","doi-asserted-by":"crossref","first-page":"495","DOI":"10.1007\/s10115-010-0356-2","volume":"29","author":"F Herrera","year":"2011","unstructured":"Herrera F, Carmona CJ, Gonzalez P, del Jesus MJ (2011) An overview on subgroup discovery: foundations and applications. Knowl Inf Syst 29(3):495\u2013525","journal-title":"Knowl Inf Syst"},{"key":"360_CR23","unstructured":"Kendall M (1948) Rank correlation methods. Griffin"},{"key":"360_CR24","doi-asserted-by":"crossref","unstructured":"Kl\u00f6sgen W (1996) Advances in knowledge discovery and data mining. American Association for Artificial Intelligence","DOI":"10.1007\/3-540-61286-6_186"},{"key":"360_CR25","unstructured":"Knorr EM, Ng RT (1998) Algorithms for mining distance-based outliers in large datasets. In: Very Large Data Bases Conference (VLDB), pp 392\u2013403"},{"issue":"3","key":"360_CR26","doi-asserted-by":"crossref","first-page":"558","DOI":"10.1137\/0209042","volume":"9","author":"EL Lawler","year":"1980","unstructured":"Lawler EL, Lenstra JK, Kan AHGR (1980) Generating all maximal independent sets: Np-hardness and polynomial-time algorithms. SIAM J Comput 9(3):558\u2013565","journal-title":"SIAM J Comput"},{"key":"360_CR27","doi-asserted-by":"crossref","unstructured":"Liu FT, Ting KM, Zhou ZH (2010) On detecting clustered anomalies using sciforest. In: European Conference on Principles of Data Mining and Knowledge Discovery (PKDD), pp 274\u2013290","DOI":"10.1007\/978-3-642-15883-4_18"},{"key":"360_CR28","unstructured":"Loureiro A, Torgo L, Soares C (2004) Outlier detection using clustering methods: a data cleaning application. In: Proceedings of the data mining for business workshop"},{"key":"360_CR29","doi-asserted-by":"crossref","unstructured":"Pandit S, Chau DH, Wang S, Faloutsos C (2007) Netprobe: a fast and scalable system for fraud detection in online auction networks. In: International World Wide Web Conference (WWW), pp 201\u2013210","DOI":"10.1145\/1242572.1242600"},{"key":"360_CR30","doi-asserted-by":"crossref","unstructured":"Wrobel S (1997) An algorithm for multi-relational discovery of subgroups. In: European Conference on Principles of Data Mining and Knowledge Discovery (PKDD), pp 78\u201387","DOI":"10.1007\/3-540-63223-9_108"},{"key":"360_CR31","doi-asserted-by":"crossref","unstructured":"Wu T (1993) An accurate computation of the hypergeometric distribution function. ACM Trans Math Softw 19(1):33\u201343","DOI":"10.1145\/151271.151274"}],"container-title":["Data Mining and Knowledge Discovery"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10618-014-0360-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10618-014-0360-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10618-014-0360-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,12]],"date-time":"2019-08-12T15:28:44Z","timestamp":1565623724000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10618-014-0360-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7,15]]},"references-count":31,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,5]]}},"alternative-id":["360"],"URL":"https:\/\/doi.org\/10.1007\/s10618-014-0360-3","relation":{},"ISSN":["1384-5810","1573-756X"],"issn-type":[{"value":"1384-5810","type":"print"},{"value":"1573-756X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,7,15]]}}}